CSI:Rowhammer - Cryptographic Security and Integrity against Rowhammer.
Jonas JuffingerLukas LamsterAndreas KoglerMaria EichlsederMoritz LippDaniel GrussPublished in: SP (2023)
Keyphrases
- high assurance
- security protocols
- key management
- security properties
- access control
- integrity verification
- data integrity
- public key cryptography
- encryption scheme
- smart card
- operating system
- data confidentiality
- fuzzy vault
- information security
- encryption decryption
- cryptographic algorithms
- random number generator
- information flow control
- stream cipher
- computer security
- elliptic curve cryptography
- security mechanisms
- encryption key
- cryptographic protocols
- trusted computing
- secure communication
- data security
- security services
- security analysis
- intrusion detection
- distributed systems
- security requirements
- conditional independence
- security model
- hash functions
- public key encryption
- protection schemes
- data encryption
- biometric data
- security systems
- authentication protocol
- public key
- rfid tags
- distributed databases